IT Brief UK - Technology news for CIOs & IT decision-makers

Credential abuse stories

Story image
Delinea introduces MFA enforcement in its Secret Server offering
Thu, 28th Sep 2023
#
pam
#
cybersecurity
#
breach prevention
Delinea Secret Server introduces MFA enforcement at depth to meet increasingly stringent cyber insurance requirements.
Story image
Keeper Security introduces major password manager update for iOS
Wed, 13th Sep 2023
#
cybersecurity
#
software update
#
ios
The updates include performance boosts for large vaults, advanced search, accessibility and workflow improvements for iOS users.
Story image
In-house intelligence teams not fit-for-purpose – report
Tue, 11th Jul 2023
#
bi
#
cyber threats
#
credential abuse
Most in-house intelligence teams lack the in-country experience and access to quality intelligence necessary for avoiding costly and embarrassing mistakes.
Story image
Malicious HTML attachments a popular cyber threat: Barracuda
Fri, 5th May 2023
#
malware
#
phishing
#
cybersecurity
Barracuda Networks has highlighted how cybercriminals leverage HTML as an attack technique in phishing, credential theft, and malware delivery.
Story image
Darktrace notes health, retail and energy cyberattack trends
Fri, 13th Jan 2023
#
network security
#
cybersecurity
#
it in healthcare
The most observed 2022 cyber incident in Australia’s healthcare was suspicious network scan activity and multiple lateral movement model breaches in 2021.
Story image
Sophos report reveals stark reality of cybercrime-as-a-service
Wed, 23rd Nov 2022
#
malware
#
ransomware
#
cybersecurity
The report addresses how ransomware remains one of the greatest cyber crime threats to organisations with operators innovating their extortion tactics.
Story image
A third of cyberattacks in the cloud leverage credential access
Tue, 22nd Nov 2022
#
cloud security
#
cybersecurity
#
credential abuse
A new report has revealed adversary success in identity theft indicates default cloud security controls are ineffective at preventing attacks.
Story image
Vectra Protect team finds Microsoft Teams vulnerability
Fri, 23rd Sep 2022
#
uc
#
microsoft
#
phishing
The Vectra Protect team identified a post-exploitation opportunity in August, allowing malicious actors to steal valid user credentials from Microsoft Teams.
Story image
Asia’s data privacy landscape is ‘coming of age’ – how can businesses cope?
Wed, 14th Sep 2022
#
cybersecurity
#
breach prevention
#
data breach
Identity theft and online fraud are on the rise, but data protection laws are evolving to combat them. Here are three key steps to address data privacy.
Story image
What every CISO must answer to enable a best-in-class security operations program
Thu, 26th May 2022
#
bi
#
big data
#
data analytics
It has been widely reported recently that South Australian government employees have been the victims of a cyberattack.
Story image
How credentials became an attacker’s easiest target
Wed, 10th Nov 2021
#
cybersecurity
#
cybersafety
#
digital credentials
Even with education and phishing tests, users continue to hand over legitimate logins to attackers, who in turn exploit them with a high degree of success.
Story image
Lack of security controls continues to put organisations at risk
Fri, 5th Nov 2021
#
cybersecurity
#
cyberark
#
insider threats
Organisations still operate with limited visibility of user activity associated with web applications, despite the risk of insider threats and credential theft.
Story image
Countering the rise of credential-based attacks
Tue, 12th Oct 2021
#
cybersecurity
#
cybersafety
#
digital credentials
By implementing behavioural analytics and smart password practices, security teams can thwart credential-based attacks across the organisation.
Story image
Attivo Networks launches credential-cloaking tool to deter data thieves
Thu, 9th Sep 2021
#
cybersecurity
#
cybersafety
#
digital credentials
The tool is part of Attivo’s Endpoint Detection Net suite, and is aimed at enabling organisations to hide credentials from would-be attackers and their tools.
Story image
How a vantage point sees threats before they impact
Wed, 25th Nov 2020
#
cybersecurity
#
casb
#
cybersafety
80% of data breaches involve compromised passwords, according to Verizon. Organisations must prioritize security measures. #CyberSecurity.
Story image
Thycotic rolls out SCIM Connector for expanded user access integration
Thu, 16th Jul 2020
#
pam
#
cybersecurity
#
thycotic
Thycotic announces general availability of SCIM Connector 2.0, allowing expanded integrations between identity providers and Secret Server.
Story image
Online users giving out social media details too freely - Kaspersky
Mon, 23rd Sep 2019
#
social media
#
kaspersky
#
awareness
The survey revealed that online users in Asia Pacific appear to be willing to share their private information in exchange for various personal gains from social media.
Story image
Gaming industry a rising target of cyber-attacks – Akamai
Fri, 26th Jul 2019
#
gaming
#
cybersecurity
#
technology gifts
Hackers have launched 12 billion credential stuffing attacks against gaming websites, making the gaming community a lucrative target, according to the Akamai State of the Internet/ Security Web Attacks and Gaming Abuse Report.
Story image
CERT NZ report: Unauthorised account access a growing problem
Wed, 10th Jul 2019
#
phishing
#
cybersecurity
#
email security
New Zealanders reported direct financial losses of $1.7 million. While that is still a substantial loss, the figure is a 71% drop from the previous quarter.
Story image
Cyber criminals targeting the gaming industry at an alarming rate
Fri, 14th Jun 2019
#
gaming
#
technology gifts
#
hackers
New research from Akamai shows the gaming community is quickly becoming one of the most highly targeted industries for cyber attacks, with hackers largely driven by gaining consumer credentials.
Story image
SIM swapping: What is it and should you be worried?
Mon, 29th Apr 2019
#
contact centre
#
cybersecurity
#
iam
Due to the growing reliance on mobile phones, SIM swapping is increasingly targeted as a way to take over a victim’s online accounts.
Story image
Google's new Chrome feature warns about compromised logins
Fri, 8th Feb 2019
#
cybersecurity
#
google
#
chrome
This week Google released extra measures in a bid to provide better security for its users’ data.
Story image
Expert comment: What the Collection #2-5 data dump means for credential abuse
Mon, 4th Feb 2019
#
phishing
#
email security
#
dlp
TechDay spoke to experts and executives in the security industry about the data leak and the implications on phishing and credential stuffing.
Story image
Massive 2.2bil-username data dump leaked on dark web
Fri, 1st Feb 2019
#
dark web
#
mfa
#
data leak
This makes the second leak three times bigger than the Collection #1 dump leaked last month.